sqli_union_extract
Extract database information from SQL injection vulnerabilities using UNION-based techniques to identify column counts, string columns, database names, versions, tables, and columns.
Instructions
Step-by-step UNION-based data extraction. 1. Finds column count via ORDER BY. 2. Identifies string-displayable columns via UNION SELECT. 3. Extracts database name and version. 4. Lists tables and columns. Returns column_count, string_columns, db_name, db_version, tables, user_columns. Side effects: Read-only GET requests. Sends ~30 requests depending on column count.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Full URL with injectable parameter, e.g. https://target/filter?category=Gifts | |
| parameter | Yes | Vulnerable query parameter name | |
| max_columns | No | Maximum columns to probe with ORDER BY |